Statistical Multiplexing and Traffic Shaping Games for Network Slicing Jiaxiao Zheng∗ , Pablo Caballero∗ , Gustavo de Veciana∗ , Seung Jun Baek† and Albert Banchs‡ ∗ The
arXiv:1705.00582v2 [cs.NI] 3 May 2017
University of Texas at Austin, TX † Korea University, Korea ‡ University Carlos III of Madrid & IMDEA Networks Institute, Spain contact:
[email protected]
Network slices could also be used to enable the sharing of network resources amongst competing (possibly virtual) operators. Indeed, sharing of spectrum and infrastructure is viewed as one way of reducing capital/operational costs and is already being considered by standardization bodies, see [1], [2], which have specified architectural and technical requirements, but left the sharing criteria and algorithmic issues open. By aggregating their traffic onto shared resources, it is expected that operators could realize substantial savings, that might justify/enable new shared investments in next generation technologies including 5G, mmWave, massive MIMO. The focus of this paper will be resource sharing amongst slices supporting stochastic (mobile) loads. A natural approach to sharing is static slicing, whereby resources are statically partitioned and allocated to slices. This offers each slice a guaranteed allocation at each base station, and protection from each other’s traffic, but, as we will see, poor efficiency. Instead, we consider, an alternative wherein each slice is pre-assigned a fixed share of the pool of resources, and redistributes its share equally amongst its active customers. In turn, each base station allocates resources to customers in proportion to their shares. We refer to this sharing model as Share Constrained Proportionally Fair (SCPF) resource allocation. By contrast with static slicing, SCPF is dynamic (since its resource allocations depend on the network state) but constrained by the network slices’ pre-assigned shares (which provides a degree of protection amongst slices). Related work. There is an enormous amount of related work on network resource sharing in the engineering, computer science and economics communities. The standard framework used in the design and analysis of communication networks is utility maximization (see e.g., [23] and references therein) which has led to the design of several transport and scheduling mechanisms and criteria, e.g., the often considered proportional fair criterion. The SCPF mechanism, described above, should be viewed as a Fisher market where agents (slices), which are share (budget) constrained, bid on network resources, see, e.g., [20] and for applications [5], [14]. The choice to re-distribute a slice’s shares (budget) equally amongst its users, can be viewed as a network mandated policy, but also emerges naturally as the social optimal, market and Nash equilibrium when slices exhibit (price taking) strategic behavior in optimizing their own utility, see [9].
Abstract—Next generation wireless architectures are expected to enable slices of shared wireless infrastructure which are customized to specific mobile operators/services. Given infrastructure costs and the stochastic nature of mobile services’ spatial loads, it is highly desirable to achieve efficient statistical multiplexing amongst network slices. We study a simple dynamic resource sharing policy which allocates a ‘share’ of a pool of (distributed) resources to each slice– Share Constrained Proportionally Fair (SCPF). We give a characterization of the achievable performance gains over static slicing, showing higher gains when a slice’s spatial load is more ‘imbalanced’ than, and/or ‘orthogonal’ to, the aggregate network load. Under SCPF, traditional network dimensioning translates to a coupled share dimensioning problem, addressing the existence of a feasible share allocation given slices’ expected loads and performance requirements. We provide a solution to robust share dimensioning for SCPF-based network slicing. Slices may wish to unilaterally manage their users’ performance via admission control which maximizes their carried loads subject to performance requirements. We show this can be modeled as a “traffic shaping” game with an achievable Nash equilibrium. Under high loads the equilibrium is explicitly characterized, as are the gains in the carried load under SCPF vs. static slicing. Detailed simulations of a wireless infrastructure supporting multiple slices with heterogeneous mobile loads show the fidelity of our models and range of validity of our high load equilibrium analysis.
I. I NTRODUCTION Next generation wireless systems are expected to embrace SDN/NFV technologies towards realizing slices of shared wireless infrastructure which are customized for specific mobile services e.g., mobile broadband, media, OTT service providers, and machine-type communications. Customization of network slices may include allocation of (virtualized) resources (communication/computation), per-slice policies, performance monitoring and management, security, accounting, etc. The ability to deploy service specific slices is viewed, not only as means to meet the diverse and sometimes stringent demands of emerging services, e.g., vehicular, augmented reality, but also an approach for infrastructure providers to reduce costs while developing revenue streams. Resource allocation in this context is more challenging than for traditional cloud computing. Indeed, rather than drawing on a centralized pool of resources, a network slice requires allocations across a distributed pool of resources, e.g., base stations. The challenge is thus to promote efficient statistical multiplexing amongst slices over pools of shared resources.
1
The novelty of our work lies in considering slice based sharing, under stochastic loads and in particular studying the expected performance resulting from such SCPF-based coupling slices’ customer allocations. Other researchers who have considered performance of stochastic networks, e.g., [7], [11] and others, have studied networks where customers are allocated resources (along routes) based on maximizing a sum of customers utilities. These works focus on network stability for ‘elastic’ customers, e.g., file transfers. Subsequently [8], [22] extended this line of work, to the evaluation of mean file delays, but only under balanced fair resource allocations (as a proxy for proportional fairness). Our focus here is on SCPF-based sharing amongst slices with stochastic loads and on “inelastic” or “rate-adaptive” customers, e.g., video, voice, and more generally customers on properly provisioned networks, whose activity on the network can be assumed to be independent of their resource allocations.
II. S YSTEM M ODEL A. Network Slices, Resources and Mobile Service Traffic We consider a collection of base stations (sectors) B shared by a set of network slices V, with cardinalities B and V respectively. For example, V might denote slices supporting different services or (virtual) mobile operators etc. We envisage each slice v as supporting a mobile service in the region served by the base stations B. Each slice supports a stochastic load of users (devices/customers) with an associated mobility/handoff policy. In particular, we assume that exogenous arrivals to slice v at base station b follow a Poisson process with intensity γbv and γ v = (γbv : b ∈ B)T . Each slice v customer at base station b has an independent sojourn time with mean µvb after which it is randomly routed to another base station or exits the system. As explained below we assume that such mobility patterns do not depend on the v resources allocated to users. We let Qv = (qi,j : i, j ∈ B) v denote a slice-dependent routing matrix where qi,j is the probabilityPa slice v customer moves from base station i to v j and 1 − j∈B qi,j is the probability it exits the system. This model induces an overall traffic intensity for slice v across base stations satisfying flow conservation equations: for all b ∈ B we have X v κvb = γbv + κva qa,b ,
Finally there is much ongoing work on developing the network slicing concept, see e.g., [21], [28] and references therein, including development of approaches to network virtualization in RAN architectures, e.g, [10], [18], and SDNbased implementation, e.g., [6]. This paper focuses on devising good slice-based resource sharing criteria to be incorporated into such architectures. Contributions of this paper. This paper makes several contributions centering on a simple and practical resource sharing mechanism: SCPF. First, we consider user performance (bit transmission delay) on slices supporting stochastic loads. In particular we develop expressions for (i) the mean performance seen by a typical user on a network slice; and (ii) the achievable performance gains versus static slicing. We show that when a slice’s load is more ‘imbalanced’ than, and/or ‘orthogonal’ to, the aggregate network load, one will see higher performance gains. Our analysis provides an insightful picture of the “geometry” of statistical multiplexing for SCPF-based network slicing. Second, under SCPF, traditional network dimensioning translates to a coupled share dimensioning problem, which addresses whether there exist feasible share allocations given slices’ expected loads and performance requirements. We provide a solution to robust share dimensioning for SCPF-based network slicing. Third, we consider decentralized per-slice performance management under SCPF sharing. In particular, we consider admission control aimed at maximizing a slice’s carried load subject to a performance constraint. When slice unilaterally optimize their admission control policies, the coupling of their decisions can be viewed as a “traffic shaping” game, which is shown to have a Nash equilibrium. For a high load regime we explicitly characterize the equilibrium and the associated gains in carried load for SCPF vs static slicing. Finally, we present detailed simulations for a shared distributed infrastructure supporting slices with different mobility patterns which match our analysis well, and further support our conclusions on gains in both performance and carried loads of SCPF sharing.
a∈B
where κvb is the traffic intensity of slice v on base station b. Accounting for users’ sojourn times, the mean offered load of slice v on base station b is ρvb = κvb µvb , and ρv , (ρvb : b ∈ B)T captures its overall system load. Letting µv = (µvb : b ∈ B)T , the flow conservation equations can be rewritten in matrix form as: ρv = diag(µv )(I − (Qv )T )−1 γ v . (1) If Qv is irreducible, I − (Qv )T is irreducibly diagonally dominant thus always invertible. Otherwise, we can always find a permutation matrix of B, say P to make: A1 B1,2 . . . .. , .. P T (I − (Qv )T )P = . . AK
where K is the number of irreducible classes. Moreover, at least one base station of each irreducible class has a nonzero exiting probability, thus AK must be invertible. Then the invertibility of I − (Qv )T follows. This model corresponds to a multi-class network of M/GI/∞ queues (base stations), where each slice corresponds to a class of customers, see, e.g., [17]. Such networks are known to have a product-form stationary distribution, i.e., the numbers of customers on slice v at base station b denoted by Nbv are mutually independent and Nbv ∼ Poisson(ρvb ). Since the sum of independent Poisson random variables is again Poisson, Pthe total number of customers on slice P v is such that N v = b∈B Nbv ∼ Poisson(ρv ) where ρv = b∈B ρvb .
2
Our network model for the numbers of customers and mobility across base stations, assumes customer sojourns/activity/mobility are independent of the network state and of the resources a customer is allocated. This is reasonable for properly engineered slices where the performance a customer sees does not impact its activity, e.g., inelastic or rate adaptive applications seeing acceptable performance. This covers a wide range of applications including voice, video streaming, IoT monitoring, real-time control, and even web browsing sessions experiencing good performance. This model however is not appropriate for customers sensitive to file download delays, e.g., who might leave the system earlier if allocated more resources. There are several natural generalizations to this model including class-based routing and user sessions (e.g. web browsing) which are not always active at the base stations they visit, see e.g., [17].
of the slice v’s resources at base station b. Thus the users transmission rate ruSS is given by sv ruSS = v cu . nb Definition 2. Share Constrained Proportionally Fair (SCPF): Under SCPF each slice re-distributes its share of the overall network resources equally amongst its active customers, which thus get a sub-share (weight) wu = nsvv for u ∈ U v , ∀v ∈ V. In turn, each base station allocates resources to customers in proportion to their weights. So a user u ∈ Ubv gets a transmission rate ruSCP F given by ruSCP F = P
wu
cu = P 0 u0 ∈Ub wu
sv nv
v 0 ∈V
0
nv b sv 0 nv 0
cu .
(2)
Thus under SCPF the overall fraction of resources slice nv v is allocated at a base station b is proportional to nbv sv , i.e., its share and its relative number of users at the base station. This provides a degree of elasticity to variations in the slice’s spatial loads. However, if a slice has a large number of customers, its customers’ weights are proportionally decreased, which protects other slices. In addition to being quite simple to implement, as mentioned in Section I SCPF resource allocations are socially optimal, and correspond to market and Nash equilibria for certain types of budget-constrained Fisher Markets. Such an allocation (with equal user weight) is simple to implement and can be shown to be socially optimal.
B. Network Slice Resource Sharing In the sequel we consider a setting where the resources allocated to a slice’s customers depend on the overall network state, i.e., number of customers each slice has on each base station, corresponding to the stochastic process described in Section II-A. Let us consider a snapshot of the system’s state and let Ubv , Ub , U v and U denote sets of active customers on slice v at base station b, at base station b, on slice v and on the overall network respectively. Thus, the cardinalities of these sets correspond to a realization of the system ‘state’, i.e., |Ubv | = nvb and |U v | = nv , where in a stationary regime nv and nvb are realizations of Poisson random variables N v and Nbv , respectively. Each base station b is modeled as a finite resource shared by its associated users Ub . A customer u ∈ Ub can be allocated a fraction fu ∈ [0, 1] of that resource, e.g., of resource blocks in a given LTE P frame, or allocated the resource for a fraction of time, where u∈Ub fu = 1. We shall neglect quantization effects. The transmission rate to customer u, denoted by ru , is then given by ru = fu cu where cu denotes the current peak rate for that user. To model customer heterogeneity across slices/base stations we shall assume cu for a typical customer on slice v at base station b is an independent realization of a random variable with the same distribution as Cbv . It may depend on the slice, since slices may support different types of customer devices (e.g., car connectivity vs mobile phone) and depend on the base station, since typical slice v users may have different spatial distributions with respect to base station b or see different levels of interference. Below we consider two resource allocation schemes. For both we assume each slices is allocated a ‘share’ P of the network resources sv , v ∈ V such that sv > 0 and v∈V sv = 1.
Theorem 1. When slices make equal weight assignments to their customers SCPF resource allocations are socially optimal in that they maximize the following surrogate network utility: X sv X max log(ru ) w0 |U v | v∈V u∈U v X s.t. sv = wu ∀v ∈ V u∈U v
ru = P
wu
u0 ∈Ub
wu0
cu
∀u ∈ U.
(3)
Alternatively, the above optimization (and thus resource allocation) can be recognized as the Eisenberg Gale program characterizing the equilibrium of a Fisher market and thus the allocations reached under a variety of response dynamics, see e.g., [27]. III. P ERFORMANCE E VALUATION In this section we study the expected performance seen by a slice’s typical customer. Given our focus on inelastic/rate adaptive traffic and tractability, we choose our customer performance metric as the reciprocal transmission rate, referred to as the Bit Transmission Delay (BTD), see e.g., [25]. This corresponds to the time taken to transmit a ‘bit’, so lower BTDs indicate higher rates and thus better performance. Short packet transmission delays are roughly proportional to the BTD. Alternatively the negative of the BTD can be viewed as
Definition 1. Static Slicing (SS): Under SS, slice v is allocated a fixed fraction sv of each base station b’s resources, and each customer u ∈ Ubv gets an equal share, i.e., 1/nvb ,
3
a concave utility function of the rate, which in the literature was referred as the potential delay utility. Given the stochastic loads on the network, we shall evaluate the average BTD seen by a typical (i.e., randomly selected) customer on a slice, i.e., averaged over the stationary distribution of the network state and transmission capacity seen by typical users, e.g., Cbv , at each base station. Such averages naturally place a higher weight on congested base stations, where a slice may have more users, best reflecting the overall performance customers will see.
=
=
v 6=v
v0 0 ρ +1 X δbv (ρvb + 1 + sv0 (1 − eρ )˜ ρvb ) sv 0
v
=
v 6=v
v0 0 (ρv + 1) (ρv + 1) X δbv (1 − ρ˜vb + g˜b − sv0 e−ρ ρ˜vb ), sv sv 0
=
A. Analysis of BTD Performance Consider a typical customer on slice v and let Ev denote the expectation of the system state as seen by such a customer, i.e., the Palm distribution [4]. For SCPF, we let Rv be a random variable denoting the rate of a typical customer on slice v, and Rbv that of such customer of slice v at base station b. Similarly, let Rv,SS and Rbv,SS denote these quantities under static slicing. Thus, under SCPF the average BTD for a typical slice v customer is given by Ev [ R1v ]. The next result characterizes the mean BTD under SCPF and SS under our traffic model. We introduce some further notation: the normalized load distribution of slice v is ρ˜v = (˜ ρvb : b ∈ B)T ρv v b where ρ˜b , ρv ; the overall share weighted normalized load P distribution is g ˜ = (˜ gb : b ∈ B)T where g˜b , v∈V sv ρ˜vb ; P v and g ˜0 = (˜ gb0 : b ∈ B)T where g˜b0 , v∈V sv (1 − e−ρ )˜ ρvb ; and the mean reciprocal resource capacity for slice v is δ v = (δbv : b ∈ B)T where δbv , Ev [ C1v ].
v 6=v
where the last equality follows by noticing that (i) N v is 0 0
Nv
0
independent of Nbv and N v and (ii) E[ Nbv0 1{N v0 >0} ] = Nv
0
0
ρv
0
0
0
P (N v > 0)E[ Nbv0 |N v > 0] = ρbv0 P (N v > 0). The latter result is given by the following lemma: Lemma 1. If N1 , N2 , . . . , Nn are independent Poisson random variables, such that Ni ∼ Poisson(ρi ), i = 1, 2, . . . , n. Then for all i we have that: n X ρi N i | Nj > 0 = Pn E Pn j=1 Nj j=1 j=1 ρj Proof. First we note that if X1 , X2 , . . . , XL are exchangeable random variables, e.g. i.i.d. Poisson random variables, we have: # "P L L X X i i=1 Xi > 0 1 = E PL | i=1 Xi i=1 " # L X X1 = LE PL | Xi > 0 i=1 Xi i=1 " # L X X1 1 ⇒ E PL | Xi > 0 = , L i=1 Xi i=1
b
Theorem 2. For network slicing based on SCPF, the mean BTD for a typical customer on slice v is given by X 1 (ρv + 1) v v v v E = ρ ˜ δ (1 − ρ ˜ + g˜b (4) b b b Rv sv b∈B v0 0 (ρv + 1) X − sv0 e−ρ ρ˜vb ). sv 0 v 6=v
Note that when ∀v ∈ V, ρ → ∞, the mean BTD has following asymptotic form: X 1 (ρv + 1) v v v Ev = ρ ˜ δ 1 − ρ ˜ + g ˜ (5) b . b b b Rv sv v
0 P s Nv N v +1 sv Nbv +1 + v0 6=v vN0 v0b 1{N v0 >0} 1 E E sv Cbv (N v +1) v v0 X 0 N +1 sv Nb δbv E (Nbv + 1) + 1 v0 sv N v0 {N >0} 0 v
where the second equality follows by symmetry. Now suppose for some small enough, for all i, we have that mi = ρi is integer valued. Let Xi,j , i = 1, . . . , n, j = 1, . . . , mi be i.i.d. Poisson random variables with parameter . Since Poisson variables are infinitely divisible we have Pmrandom i that Ni ∼ j=1 Xi,j . It follows from the previous symmetry argument that: n X N i | Nj > 0 E Pn j=1 Nj j=1 P mi n X X j=1 i,j = E Pn Pmi | Nj > 0 i=1 j=1 Xi,j j=1 n X X i,1 = mi E Pn Pmi | Nj > 0 j=1 Xi,j j=1 i=1
b∈B
For network slicing based on SS, the mean BTD for a typical customer on slice v is given by X v ρb + 1 1 v v = ρ ˜ δ . (6) Ev b b Rv,SS sv b∈B
Proof. Recall that Poisson arrivals see time averages, i.e., see the remaining users in the product-form stationary distribution, given in Section II-A. Thus the distribution as seen by a typical user on slice v at base station b is the same as the productform distribution plus an additional customer on slice v at base station b. Using this fact and SCPF resource allocations as given by Eq. (2), the BTD of a typical slice v user at base station b can be expressed as follows: 1 v E Rbv
=
4
m Pn j
j=1 mj
ρi = Pn
j=1
ρj
.
The above equality also follows when ρ = (ρi , i = 1, . . . , n) takes rational value. Since the conditional expectation will be a continuous function of the parameter vector ρ, the equality follows more generally for the case where ρ is a real valued vector.
a gain. A sufficient condition for gains under high loads is that k˜ g k2 ≤ kρ˜v k2 . Since k˜ g k1 = kρ˜v k1 = 1, this follows when the overall share weighted relative load on the network is more balanced than that of slice v. One would typically expect aggregated traffic to be more balanced than that of individual slices. This condition is fairly weak, i.e., it does not depend on where the loads are placed, but on how balanced they are. The corollary also suggests gains are higher when cos(θ(˜ g , ρ˜v )) is small. In other words, a slice with imbalanced normalized loads whose relative load distribution is ‘orthogonal’ to the shared weighted aggregate traffic, i.e., θ(˜ g, ρ˜v ) ≈ 0, will tend to see higher gains. The simulations in Section V further explore these observations.
Under static slicing we have that " # v 1 (Nb + 1) 1 ρv + 1 v v = E E E = δbv b . v v,SS Cb sv sv Rb The theorem follows by taking an weighted average across base stations – weighted by the fraction of customers at each base station, i.e., ρ˜vb . B. Analysis of Gain
IV. P ERFORMANCE M ANAGEMENT
Using the results in Theorem 2 one can evaluate the gains in the mean BTD for a typical slice v user under SCPF versus SS, i.e., 1 Ev Rv,SS . Gv = Ev R1v
In practice each slice v ∈ V may wish to provide service guarantees to its customers, i.e., ensure that the mean BTD does not exceed a performance target dv . Below we investigate how to dimension network shares to support slice loads subject to such mean BTD requirements. In the following part we assume the following assumption is in effect.
In general, one would expect Gv ≥ 1 since under SCPF typical users should see higher allocated rates and thus lower BTDs. One can verify that is the case when slices have uniform loads across base stations but the general case is more subtle. For simplicity from here on in this paper we focus on the case where the following additional assumption is in effect:
Assumption 2. All slice v ∈ V have heavy load. That is, ∀v ∈ V, ρv 1. A. Share Dimensioning under SCPF
Assumption 1. Base stations h are i said to be homogeneous for slice v if for all b ∈ B: Ev C1v = δv .
Consider a network supporting the traffic loads of a single slice, say v, so sv = 1 and g˜ = ρ˜v and let d˜v , dv /δv denote slice v’s normalized BTD constraint. Note that δv is the minimum BTD achievable when a user gets all the base station resources, so a target requirement satisfies dv > δv and so d˜v > 1. For slice v to meet a mean BTD constraint d˜v , it follows from Eq. (5) that :
b
Note that Assumption 1 only requires the average reciprocal capacity a given slices’ customer sees across base stations is homogenous. Corollary 1. Under Assumption 1, the BTD gain of SCPF over SS for slice v is given by Gv =
sv (1 − (1 −
e−ρv
ρv kρ˜v k22 + 1 − ρv e−ρv )kρ˜v k22 ) + (ρv + 1)˜ g 0,T ρ˜v
ρv ≤ l(d˜v , ρ˜v ) ,
We can interpret l(d˜v , ρ˜v ) as the maximal admissible carried load ρv given a fixed relative load distribution ρ˜v and requirement d˜v . As might be expected, if the relative load distribution ρ˜v is more balanced, i.e., kρ˜v k22 is smaller, or if the BTD constraint is relaxed, i.e., d˜v is higher, the slice can carry a higher overall load ρv . Next, let us consider SCPF based sharing amongst a set of slices V each with its own BTD requirements. It follows from Eq. (5) that to meet such requirements on each slice the following should hold: for all v ∈ V
For fixed relative loads ρ˜v and g˜, the gain for low overall load (ρv → 0) is positive and given by: GL v =
1 ≥1 sv + g˜0,T ρ˜v
where g˜0 is the effective shared weighted relative load of other slices on network. Furthermore, Gv is a nonincreasing function of ρv , and for high loads (∀v, ρv → ∞) is given by: GH v =
d˜v − 1 . kρ˜v k22
1 kρ˜v k2 × , k˜ g k2 cos(θ(˜ g , ρ˜v ))
where θ(˜ g , ρ˜v ) denotes the angle between the slice’s relative loads and the overall share weighted relative loads on the network.
sv ≥
X kρ˜u k2 1 + ρv su cos(θ(ρ˜u , ρ˜v )). l(d˜v , ρ˜v ) − ρv u6=v kρ˜v k2
(7)
This can be written as:
Please see appendix for detailed proof. The result indicates that for slice v with fixed relative loads ρ˜v , the gains decrease in the overall load ρv , thus if GH v > 1 SCPF always provides
X
v∈V
5
sv hv 0,
(8)
where we refer to hv = (hvu : u ∈ V)T as v’s share coupling vector, given by ( 1 v=u u hvu = ˜v k2 kρ u ˜v ˜ − l(d˜ 1+ρ cos(θ( ρ , ρ )) v 6= u. u ˜ k2 ˜u )−ρu kρ ,ρ
contrast with Section II-A, note that ρv now represents the load after admission control, which may have a reduced overall load and possibly changed relative loads across base stations – i.e., shape the traffic on the slice. We also let g˜ be the overall share weighted relative loads after admission control, see Section III-A. Note that we have assumed only exogenous arrivals can be blocked, thus once a customer is admitted it will not be dropped –the intent is to manage performance to maintain service continuity. Below we consider a setting where slices unilaterally optimize their admission control policies in response to network congestion, rather than a single joint global optimization. The intent is to allow slices (which may correspond to competing virtual operator/services) to optimize their own performance, and/or enable decentralization in settings with SCPF based sharing. Suppose each slice v optimizes its admission control policy so as to maximize its overall carried load ρv , i.e., the average number of active users on the network, subject to a mean BTD constraint d˜v . Under Assumption 1 the optimal policy for slice v is the solution to the following optimization problem:
u
We can interpret hvv = 1 as the benefit to slice v of allocating unit share to it.u When v 6= u, hvu depends on two factors. The first l(d˜ 1+ρ captures the sensitivity of slice u to the ˜u )−ρu u ,ρ ‘share weighted congestion’ from other slices. If ρu is close to its limit l(d˜u ,vρ˜u ), its sensitivity is naturally very high. The second term, kkρρ˜˜ukk22 cos(θ(ρ˜u , ρ˜v )) captures the impact of slice v’s load distribution on slice u. Note that if two slices load distributions are orthogonal, they do not affect each other. The following result summarizes the above analysis. Theorem 3. There exists a share allocation such that slice loads and BTD constraints ((ρv , ρ˜v , dv ) : v ∈ V) are admissible under SCPF sharing if and only if there exists an s = (sv : v ∈ V)T such that ksk1 = 1, s 0 and X sv hv 0. v∈V
Admissibility can then be verified by solving the following maxmin problem: X max{ min sv hvi : ksk1 = 1 }. (9) s0
i
max
ρ ˜v ,ρv
s.t.
v∈V
If the optimal objective function is positive, the traffic pattern is admissible. Moreover, if there are multiple feasible share allocations, then the optimizer is a ‘robust’ choice in that it maximizes the minimum share given to any slice, giving slices margins to tolerate perturbations in the slice loads satisfying Eq. (8). If a set of network slice loads and BTD constraints are not feasible, admission control will need to be applied. We discuss this in the next section.
(10)
av = ρv M v ρ˜v , av ∈ [0, 1]B , 1T ρ˜v = 1 (ρv + 1) T v g˜ ρ˜ − kρ˜v k22 ≤ d˜v − 1. sv
(11) (12)
Note that Eq. (11) establishes a one-to-one mapping between (ρ˜v , ρv ) and av . We will use ρ˜v and ρv to parameterize admission control decisions for slice v. The BTD constraint in Eq. (12) follows from Eq. (5). Also note that this admission control policy depends on both the overall share weighted loads on the network g˜, the slice’s load and its customer mobility patterns (i.e., M v ). Unfortunately this problem is not convex due to the BTD constraint Eq. (12); however, for high overall per slice loads it is easily shown to be convex, hence for simplicity we will make the following additional assumption.
B. Admission Control and Traffic Shaping Games A natural approach to managing performance in overloaded systems is to perform admission control. In the context of slices supporting mobile services where spatial loads may vary substantially, this may be unavoidable. Below we consider admission control policies that adapt to changes in load. Specifically an admission control policy for slice v is parameterized by av = (avb : b ∈ B)T ∈ [0, 1]B where avb is the probability a new customer at base station b is admitted. Such decisions are assumed to be made independently thus admitted customers for slice v at base station b still follow a Poisson Process with rate γbv avb . Based on the flow conservation equation Eq. (1) one can obtain the carried load ρv induced by admission control policy av via
Assumption 3. The network is said to see high overall slice loads, if for all v ∈ V we have ρv 1. Under Assumption 3 we have that 1 + ρv ≈ ρv and the left hand side of Eq. (12) becomes:
ρv T v (ρv + 1) T v g˜ ρ˜ − kρ˜v k22 ≈ g˜ ρ˜ = (sv xv )−1 g˜T ρ˜v (13) sv sv where we have defined xv , (ρv )−1 . Further defining ρ˜−v , 0 (ρ˜v : v 0 ∈ V\{v}), Eq. (12) can be replaced by: fv (ρ˜v ; ρ˜−v ) , g˜T ρ˜v ≤ sv (d˜v − 1)xv .
ρv = (M v )−1 av = diag(µv )(I − (Qv )T )−1 diag(γ v )av
(14)
Thus, defining y v , (ρ˜v , xv ), which is equivalent to (ρ˜v , ρv ), 0 together with y −v , (y v : v 0 ∈ V\{v}), under Assumption 3 each slice can unilaterally optimize its admission control policy by solving the following problem:
where M v , diag(γ v )−1 (I −(Qv )T )diag(µv )−1 is invertible because I − (Qv )T is irreducibly diagonally dominant.1 By 1 If
ρv
γ v is not strictly positive one can reduce the dimensionality.
6
Admission control for slice v under SCPF(ACv ): Given other slices’ admission decisions y −v , slice v determines its admission control policy y v = (ρ˜v , xv ) by solving { xv | y v ∈ Y v (y −v ) } min v y
each slice’s objective function is regularized by the distance to the previous reciprocal carried load xv . Specifically, the admission control strategy of slice v in response to other slices is now given as the solution to the following optimization problem: Lv (y; λv ) = argmin θv ((y v )0 , y −v ; λv )+ (xv −x0v )2 , (17) 2 v 0 v (y ) ∈Y¯
(15)
where Y v (y −v ) denotes slice v’s feasible policies and is given by Y v (y −v ) , { y v | 1T ρ˜v = 1, 0 M v ρ˜v xv 1, fv (ρ˜v ; ρ˜−v ) ≤ sv (d˜v − 1)xv }. (16)
where we define a BTD penalty function for slice v as hv (y) , fv (ρ˜v ; ρ˜−v ) − sv (d˜v − 1)xv .
Note that ACv is coupled to the decisions of other slices through the constraint set Yv (y −v ). Thus, one cannot independently solve each slice’s admission control problem to obtain an efficient solution. Furthermore, devising a global optimization for all slices brings both complexity and nonconvexity from the BTD constraints. A natural approach requiring minimal communication and cooperation overhead is to consider a game setup where network slices are players, each seeking to maximize their carried load (and the corresponding revenue) subject to BTD constraints. We formally define the traffic shaping game for a set of network slices V as follows. We let y , (yv : v ∈ V) denote the simultaneous strategies of all slices (given by the respective admission control policies). As in ACv , each slice v picks a feasible strategy, i.e., y v ∈ Y v (y −v ) to maximize its objective function θv (y v , y −v ) , xv . Note in the sequel we will modify θv (·, ·) to ensure the games convergence. A Nash equilibrium is a simultaneous strategy y ∗ such that no slice can unilaterally improve its carried load, i.e., for all v ∈ V
and the objective function for slice v is now (different from what is previously defined): θv (y v , y −v ; λv ) , exv + λv [hv (y)]+ , with (x)+ , max(0, x). The last term in Eq. (17) serves as a regularization term. The strategy space is now Y¯ v , {yv |1T ρ˜v = 1, 0 M v ρ˜v xv 1} and xv is substituted by exv to ensure strong convexity, which is required for convergence (note that due to the monotonicity, exv and xv should result in the same optimizer). We propose to use the inexact line search update introduced in [24]. In order to make sure the iteration is proceeding towards the equilibrium, we use X Ω (y; λ) , θv (y v , y −v ; λv ) − θv (Lv (y; λ), y −v ; λv ) v∈V
− (xv − x0v )2 ≥ 0 2
as a metric, observing that the equilibrium is given by y ∗ if and only if Ω (y ∗ ; λ) = 0. Therefore we seek to decrease Ω (y; λ) by a sufficient amount at each iteration. The task executed by each slice v is given in Algorithm 1, while the central entity, which is responsible for collecting and delivering information and updating λ, executes Algorithm 2. This then follows the algorithm proposed in [13].
θv (y v,∗ , y −v,∗ ) ≤ θv (y v , y −v,∗ ) ∀y v ∈ Y v (y −v,∗ ).
The following result follows from Theorem 3.1 in [12]. Theorem 4. The traffic shaping game defined above has a Nash equilibrium.
Algorithm 1 Algorithm of Slice v
C. Algorithm
1: 2: 3:
Given the existence of a Nash equilibrium, the next question is whether one can devise an iterative mechanism to find it. In our setting this is not a simple matter. The difficulty arises from the fact that slices’ strategy spaces depend on other’s choices, and the overall feasible joint strategies y lie in a nonconvex set, so oscillation is possible. In the literature such settings are specifically referred to as Generalized Nash Equilibrium Problem (GNEP), see e.g., [13] and [24]. Below we propose an algorithm involving slices and a central entity which is guaranteed to converge to the equilibrium. We summarize the main ideas as follows. To decouple dependencies among strategy spaces, we shall move slice v’s BTD constraint into its objective function as a penalty term with an associated multiplier λv . Let λ = (λ1 , λ2 , . . . , λV ). By adjusting the value of λ according to y at each iteration, one can determine a setting such that, at the induced Nash Equilibrium, all slices meet their BTD constraints, and the equilibrium is identical to that of the traffic shaping game. In addition, in order to prevent overshooting, at each iteration
Set k ← 0 and collect from central entity. Receive λv (k) and y(k) from central entity. Compute Lv (y(k); λ) and transmit it back to the central entity. Set k ← k + 1. Go to step 2
Theorem 5. Let {y(k)} be the sequence of admission control decisions generated by Algorithm 1 and Algorithm 2, then every limit point of this sequence is a Nash equilibrium of the traffic shaping game induced by ACv . Proof. First we need to verify the Assumption 5.1 in [24] to guarantee that for a given λ, step 4 in Algorithm 2 converges to a Nash equilibrium. non-constant part of Ψ (y, y 0 ; λ) P The 0 xv when y is fixed is: v e + λv [hv (y)]+ − 2 kxv − x0v k2 . If is small enough, the concavity of the last term will be canceled out by exv . Then the non-constant part is always convex in y. Hence, the Assumption 5.1 holds true together with the propositions 2.1(a) - (d) in [24]. Therefore, the proposed algorithm generates Nash equilibrium of the game.
7
Algorithm 2 Penalized Update in Central Entity
The second term rewards a slice for balancing its own relative loads. The Nash equilibrium in the saturated regime is thus a compromise between these two objectives while constrained by the network slices mobility patterns and feasible admission control policies. Admission control for slice v under SS (ACSSv ): Under SS slice v can determine its optimal admission control yv by solving:
Choose a starting point y(0), λ(0) 0, ηv ∈ (0, 1), for v ∈ V, β, σ ∈ (0, 1), > 0 but small enough (see following theorem for convergence) and set k ← 0. 2: If a termination criterion is met then STOP. Otherwise, communicate y(k) together with λv (k) to all slices. 3: All slices compute Lv (y(k); λ) and feedback to central entity. 4: Compute t(k) = max{β l |l = 0, 1, 2, . . . } such that if we assume ξ(k) = (Lv (y(k); λ(k)) : v ∈ V) − y(k):
1:
max
ρ ˜v ,ρv
s.t.
Ω (y(k)+t(k)ξ(k)) ≤ Ω (y(k))−σ(t(k))2 kξ(k)k. (18)
(19)
Theorem 7. Under Assumptions 1 and 4, the optimal admission control policy under SS are decoupled. The optimal choice for slice v ρ˜v,SS,∗ is the unique solution to: min kρ˜v k22 ,
= and the associated carried load is given by ρSS,∗ v
Next we study the characteristics of the resulting traffic shaping Nash equilibrium. To make this tractable we consider networks which are saturated and subsequently (Section V) provide simulations to evaluate other settings.
Gload , v
Assumption 4. (Saturated Regime) Suppose the system is such that for each network slice, the optimal admission control for both SCPF and SS2 in response to other slices’ load is such that for all v ∈ V, av ≺ 1.
Gload = v
where Γ , { ρ˜ | 1 ρ˜ = 1, M ρ˜ 0 }, and the (d˜v −1) associated carried load for slice v is ρ∗v = sg˜v∗,T , where ρ ˜v,∗ ∗ ˜ corresponds to the overall share weighted relative loads g distributions at the equilibrium. v v
See appendix for detailed proof. The first term in the objective function in Eq. (20) rewards balancing the overall share weighted relative loads on network. 2 Admission
kρ˜v,SS,∗ k22 sv (d˜v − 1) × . ∗,T v,∗ g˜ ρ˜ sv d˜v − 1
(22)
sv d˜v − sv ≥ 1, ∀v ∈ V. sv d˜v − 1
(23)
See appendix for detailed proof. Note that in order for a BTD constraint to be feasible under SS, one must require sv d˜v > 1. It can be seen that the gain exhibited in Corollary 2 can be very high when sv ↓ 1/d˜v . Furthermore if sv ↑ 1 we have that Gload ↓ 1, i.e., no actual v gain. This result implies that slices with small shares or tight BTD constraints will benefit most from sharing, coinciding with our observations in Corollary 1.
v
v
ρSS,∗ v
=
Corollary 2. Under Assumptions 1, 3 and 4, if user mobility patterns are such that B1 1 ∈ Γv for all v ∈ V, the gain in the total carried load under the SCPF traffic shaping Nash equilibrium vs. optimal admission control for SS is given by:
Theorem 6. Under Assumptions 1, 3 and 4, the relative load distributions at the Nash equilibrium of the traffic shaping game ρ˜∗ , (ρ˜v,∗ : v ∈ V) are the unique solution to: X X v 2 min k s ρ ˜ k + s2v kρ˜v k22 , (20) v 2 v v v
ρ∗v
The first factor captures a traffic shaping dependent gain for slice v. The second factor is a result of statistical multiplexing gains. A simple special case is highlighted in the following corollary.
Assumption 4 depends on many factors including the BTD constraint, the mobility pattern and network slices’ shares, but it is generally true when the exogenous traffic of all slices at all base stations γbv is high. When this is the case we have the following:
T
sv d˜v −1 . ˜v,SS,∗ k22 kρ
By comparing Eq. (20) and Eq. (21), one can see that under SS, slices simply seek to balance their own relative loads on , one the network. By taking the ratio between ρ∗v and ρSS,∗ v can show that under Assumptions 1, 3 and 4 the gain in carried load for slice v is given by
D. Characterization of Traffic Shaping Equilibrium
v
(21)
˜v ∈Γv ρ
One can easily verify that the EMFCQ condition given by Definition 2.7 in [13] is satisfied. Thus for all v the λv gets updated a finite number of times. According to Theorem 2.5 in [13], the claim is true.
v
av ∈ [0, 1]B
Note slice admission control decisions are clearly decoupled under SS, but paralleling Theorem 6 we have following result.
then λv (k + 1) ← 2λv (k). Set k ← k + 1. Broadcast y(k) and λ(k) to slices and go to step 2.
˜ ∈Γ :v∈V) (ρ
av = ρv M v ρ˜v ,
1T ρ˜v = 1 and ρv kρ˜v k22 ≤ (sv d˜v − 1).
Then set y(k + 1) = y(k) + t(k)ξ(k). 5: Set I(k) = {v|hv (y(k)) > 0}. For every v ∈ I(k), if exv (k) > ηv (λv k∇yv hv y(k))k),
ρv
V. P ERFORMANCE EVALUATION We simulated a wireless network shared by multiple slices supporting mobile customers following the IMT-Advanced evaluation guidelines [16]. The system consists of 19 base
control under SS is defined in the sequel.
8
Scenario: Slices
Spatial loads
1 Homogeneous 2 Homogeneous 3 Heterogeneous 4 Mixed Slices
kρ ˜v k2
k˜ g k2
θ(˜ g, ρ ˜v )
GH v
uniform.
0.27
0.27
7.09
1.0 %
non-uniform
0.32
0.32
6.18
1.0 %
orthogonal
0.36
0.26
41.78
83.3 %
1&2 non-uniform
0.36
0.23
25.52
70.4 %
3&4 uniform
0.19
0.23
48.00
23.7 %
Fig. 1: Snapshot of users positions per slice and scenario exhibiting the different characteristics of traffic spatial loads. Left to right: Scenarios 1 to 4.
TABLE I: Measured normalized slice and network traffic norms and angles for highest load case of each scenario. stations in a hexagonal cell layout with an intersite distance of 200 meters and 3 sector antennas, mimicking a dense ‘small cell’ deployment. Thus, in this system, B corresponds to 57 sectors. Users associate to the sector offering the strongest SINR , where the downlink SINR is modeled as in [26]:
1.9 Scenario 3
1.8
Gain in BTD
SINRub
Simulation results Theoretical results
2
Pb Gub , =P 2 k∈B,k6=b Pk Guk + σ
where, following [16], the noise σ 2 = −104dB, the transmit power Pb = 41dB and the channel gain between user u and BS sector b, denoted by Gub , accounts for path loss, shadowing, fast fading and antenna gain. Letting du,b denote the current distance in meters from the user u to sector b, the path loss is defined as 36.7 log10 (dub ) + 22.7 + 26 log10 (fc )dB, for a carrier frequency fc = 2.5GHz. The antenna gain is set to 17 dBi, shadowing is updated every second and modeled by a lognormal distribution with standard deviation of 8dB, as in [26]; and fast fading follows a Rayleigh distribution depending on the mobile’s speed and the angle of incidence. The downlink rate cu currently achievable to user u is based on discrete set modulation and coding schemes (MCS) and associated SINR thresholds given in [3]. This MCS value is selected based on the averaged SINRub , where channel fast fading is averaged over a second. We model slices’ with different spatial loads by modeling different customer mobility patterns. Roughly uniform spatial loads are obtained by simulating the Random Waypoint model [15], while non-uniform loads obtained by simulating the SLAW model [19]. These mobility models would not induce Markovian motion amongst base stations assumed in our analysis, yet the analytical results are robust to these assumptions.
1.7
Scenario 4: Slices 1&2
1.6 1.5
Scenario 4: Slices 3&4
1.4 1.3 Scenario 1
1.2 1.1 1
Scenario 2 4
8
12
16
24
30
Offered traffic (|U |/|B|)
Fig. 2: BTD gain for our 4 different scenarios simulation. the aggregate network traffic is “smoother” than the individual slice’s traffic, and the gains are indeed higher. This is also the case for Slice 1 and 2 in Scenario 4, since these slices loads are more “imbalanced” than the other two slices, they experience higher gains. In Scenario 2, where slices nonhomogenous spatial loads are ‘aligned’, aggregation does not lead to smoothing and the gains are least. As can be seen in Figure 2 the simulated and theoretical gains (dashed lines) of Corollary 1 are an excellent match. The theoretical model has been calibrated to the mean reciprocal capacities seen by slice customers (i.e., γbv ’s) and the measured induced loads resulting from the slice mobility patterns. B. Traffic Shaping Equilibrium and Carried Load Gains
A. Statistical Multiplexing and BTD Gains
In order to study the equilibria reached by the traffic shaping game, we measured the underlying user mobility patterns in Section V-A, and modeled it via a random routing matrix. We further assumed uniform intensity of arrivals rates at all base stations and uniform exit probabilities of 0.1. The mean holding time at each base station was again calibrated with the simulations in Section V-A. We considered a traffic shaping game for a network shared by 3 slices, where Slice 1 has uniform spatial loads and Slice 2 and 3 have different non-uniform spatial loads. All slices have equal shares and their capacity normalized BTD requirements are set to d˜1 = 10, d˜2 = 12, d˜3 = 15 respectively. The Nash equilibrium was solved via the algorithm included in Section IV-C. The
We evaluated the BTD gains of SCPF vs SS for four simulation scenarios, each including 4 slices, each with equal shares but different spatial load patterns. For each scenario, we provide results for simulated BTD gains, and results from our theoretical analysis (Corollary 1) based on the empirically obtained spatial traffic loads. More detailed information regarding simulated scenarios and resulting empirical spatial traffic loads for high load regime are displayed in Table I and a snapshot of locations for the 4 slices’ users in a network with a load of 4 users per sector is displayed in Figure 1. The results given in Figure 2 show the BTD gains for each scenario as the overall network load increases. In Scenario 3,
9
the load interactions in such sharing models, in particular the impact of relative load distributions on statistical multiplexing, and the role of traffic shaping in optimizing admission control. Finally, we note that our approach to admission control in an SCPF shared system is novel in that each slice exploits knowledge of its customers’ mobility patterns to optimize its carried load and assure service continuity.
1.8 1.7
0.22
1.6
0.18
M or eb ala nc Slices 2 & 3 ed
Gain in carried load
0.2
0.16
1.5
Aggregate
0.14 0.12
1.4
0
Slice 1 0.3 0.5 0.7
1
1.2
1.5
VII. A PPENDIX
1.3
1.1 1
0 0.1
A. Proof of Theorem 1
Slice 1 Slice 2 Slice 3 Aggregate Theoretical
1.2
0.3
0.5
0.7
1
1.2
A w induces a probability distribution at resource b as: wu : u ∈ Ub ), pb (w) = (pu (w) , P 0 u ∈Ub wu0
1.5
Suppose w∗ = (wu∗ = |Usvv | : u ∈ U), where u ∈ U v . Let us define the objective function of problem (1) as U (w). For an arbitrary w we have: X X sv w∗ cu U (w∗ ) − U (w) = (log( P u ∗ ) v |U | u0 ∈Ub wu0 v∈V u∈U v w u cu − log( P )) 0 u0 ∈Ub wu X X X X pu (w∗ ) ) = ( wu∗ 0 ) pu (w∗ ) log( pu (w) v∈V u∈U v b∈B u0 ∈Ub X X = ( wu∗ 0 )D(pb (w∗ )||pb (w))
Arrival rate
Fig. 3: Gain in carried load for various arrival rates. Subfigure: Balancing in relative load. convergence is reached within 3 rounds of iterations under the parameters ηv = β = 0.5, ∀v ∈ V, σ = 0.1, = 0.01. The results shown in Figure 3 exhibit dashed lines corresponding to the theoretical carried load gains in the saturated regime. As can be seen, these coincide with the Nash equilibria of the simulated traffic shaping games for high arrival rates. For lower arrival rates the gains can be much higher, e.g., almost 1.6x, for slices with non-uniform mobility patterns. This was to be expected since for lower loads we expect higher statistical multiplexing gains from sharing, and thus relatively higher carried loads to be admitted. For very low loads, as expected, there are no gains since all traffic can be admitted and BTD constraints are met. Also shown in Figure 3(subfigure) is the degree to which the relative loads of slices ρ˜v , and the weighted aggregate traffic on the network g˜ are balanced, as measured by || · ||2 , as the arrival rates on the network increase. As expected, based on Theorem 6, as arrivals increase relative loads of slices and the network become more balanced, showing the compromise the traffic shaping game is making, balancing slices relative loads and that of the overall network.
b∈B u0 ∈Ub
≥ 0,
where D(pb (w∗ )||pb (w)) denotes the Kullback-Leibler divergence between pb (w∗ ) and pb (w). The second equality holds true by repartitioning users by the base stations they are associated with. The last inequality comes from the nonnegativity of the Kullback-Leibler divergence. Thus w∗ has a higher utility than any other arbitrary weight allocation thus is optimal. B. Proof of Corollary 1 Using the result in Theorem 2 under Assumption 1 we have that v 1 v −ρv v −ρv v 2 (ρ + 1) 0,T v E = δ [1−(1−e −ρ e )k ρ ˜ k + g˜ ρ˜ ] v 2 Rv sv (24) Similarly for static slicing we have that 1 δv Ev = (ρv kρ˜v k22 + 1). (25) v,SS R sv
VI. C ONCLUSIONS This paper has thoroughly explored a relatively simple and natural approach for resource sharing amongst network slices – SCPF – which corresponds to socially optimal allocations in a Fisher market. Our analysis of performance in settings where slices support stochastic loads provides explicit formulas for (i) the performance gains one can expect over static slicing, (ii) how to dimension slice shares to meet performance objectives, and (iii) how to go about performance management through admission control. If dynamic resource sharing amongst network slices is to be adopted, the ability to realize disciplined engineering and performance prediction will be the key. Our analysis of SCPF seems to meet these requirements and at the same time reveals some intriguing insights regarding
Taking the ratio of the overall mean BTDs gives the gain for slice v:
ρv kρ˜v k22 + 1 sv (1 − (1 − e−ρv − ρv e−ρv )kρ˜v k22 ) + (ρv + 1)˜ g 0,T ρ˜v (26) By plugging in ρv = 0, it is easy to see that:
Gv =
GL v =
10
1 1 1 ≥ v T v = . v ˜ g 0,T v sv + g˜ ρ˜ (˜ g ) ρ˜ + sv (1 − sv )( 1−sv )T ρ˜v + sv
v
v
˜ ˜ g g Because k 1−s k1 = 1, ( 1−s )T ρ˜v ≤ 1. Therefore GL v ≥ 1. v v P v0 0 −ρ ˜ Equation (26) Let’s say g˜−v = v0 6=v sv0 (1 − e )ρ˜ + sv ρ. can be written as:
Gv =
kρ˜v k22
0,T v g˜−v ρ˜
= 0,
and χv,∗ 0, ρ˜v,∗ ∈ Γv , which is exactly the same as the KKT condition of problem (20). Therefore, problem (20) is solved at the Nash equilibrium. Moreover, we could compute the total carried load of slice v by setting
+
1 − [kρ˜v k22 + (1 − kρ˜v k22 )
sv kρ ˜v k22 0,T v ] ˜−v g ρ ˜
0,T v (ρv + 1)˜ g−v ρ˜ + sv (1 − kρ˜v k22 )
.
fv (ρ˜v,∗ ; ρ˜−v,∗ ) = sv (d˜v − 1)/ρ∗v ,
(27)
which gives us ρ∗v =
s kρ ˜v k2
Note that g˜v0,T ρ˜v2 ≤ 1, thus the numerator of the second −v term is nonnegative. Therefore Gv is decreasing in ρv . When ρv → ∞, ∀v ∈ V, the second term in Eq. (27) vanishes, and 0 g˜−v → g˜. Then GH v is given by: GH v
Under the saturated regime, BTD constraint of each v ∈ V must be binding. Thus we have: ρv =
kρ˜v k2 = T v2 g˜ ρ˜
min kρ˜v k22 v ρ ˜
s.t.
sv fv (ρ˜v ; ρ˜−v ),
Then the optimal load is obtained by plugging in the BTD constraint.
(29)
E. Proof of Corollary 2 Under SS, it is obvious that the optimal relative load distribution of slice v is 1 ρ˜v,SS,∗ = 1 B
A constant factor sv in the objective function has no impact to the minimizer. We can show that the optimality condition of problem (20) is the same as each slice v optimizing its own problem given by Eq. (29). Dividing the objective function by 2, the Lagrangian of problem (20) is: X 1 X ˜ ζ, χ) = (k L(ρ; sv ρ˜v k22 + s2v kρ˜v k22 ) 2 v Xv X T v + ζv (1 ρ˜ − 1) − (χv )T Mv ρ˜v , (30)
Plugging it in the BTD constraint one can get ρSS,∗ = v B(sv d˜v − 1), thus ρv,SS,∗ = (sv d˜v − 1)1. Dividing the objective function by sv and discarding the routing constraints, the Lagrangian of Eq. (29) is: (˜ g v )T ρ˜v + ν(1T ρ˜v − 1),
v∈V
where ρ˜ , (ρ˜v : v ∈ V)T , and dual variables ζ , (ζv : v ∈ V)T with χ , (χv : v ∈ V)T . According to the KKT condition, the solution ρ˜∗ must be such that, for all v ∈ V:
where ν is the dual variable. Solving its KKT condition we have: X 0 1 (ν1 + sv0 ρ˜v ). (34) ρ˜v,∗ = − 2sv 0
∇ρ˜v L(ρ∗ ; ζ ∗ , χ∗ ) = s2v ρ˜v,∗ + sv g˜ + ζv∗ 1 − (M v )T χv,∗
v 6=v
(31)
= 0,
Substituting in 1T ρ˜v,∗ = 1 we have ν = − svB+1 . When B1 1 ∈ Γv , ∀v ∈ V, Eq. (34) implies that if all other slices v 0 6= v pick their relative loads as B1 1, then P 0 ( v0 6=v sv0 ρ˜v ) k 1, meaning that this is the Nash equilibrium of the game. Note that since ρ˜v,∗ is feasible and optimal for a relaxed feasible set, it will still be optimal if we put back the routing constraints. Thus we have that:
and χv,∗ 0, ρ˜v,∗ ∈ Γv . The Lagrangian of problem (29) is: Lv (ρ˜v ; ζv , χv ) =˜ g T (sv ρ˜v ) + ζv (1T ρ˜v − 1) − (χv )T Mv ρ˜v .
M v ρ˜v 0 1T ρ˜v = 1.
Also Assumption 4 guarantees that for all v ∈ V, M v ρ˜v xv 1 is not binding then the ACv can be reformulated as:
v∈V
sv d˜v − 1 . kρ˜v k22
Moreover, the constraint av 1 should be satisfied with strict inequality, thus the optimal policy ρ˜v,SS,∗ under SS is given by:
Under the saturated regime, BTD constraint of each v ∈ V must be binding because we are blocking traffics. Thus we have: fv (ρ˜v ; ρ˜−v ) , (28) xv = sv (d˜v − 1)
min
sv (d˜v −1) . ˜∗,T ρ g ˜v,∗
D. Proof of Theorem 7
C. Proof of Theorem 6
ρ ˜v ∈Γv
(33)
(32)
If slice v’s relative load ρ˜v,∗ optimizes problem (29) given other slices’ ρ˜−v,∗ , following KKT condition should be met:
g˜∗,T ρ˜v,∗ =
∇ρ˜v,∗ Lv (ρ˜v,∗ ; ζv∗ , χv,∗ ) = s2v ρ˜v,∗ + sv g˜
+ ζv∗ 1 − (Mv−1 )T χv,∗
1 . B
Then the carried load gain is obtained by plugging in Eq. (22).
11
R EFERENCES [1] Telecommunication management; Network sharing; Concepts and requirements. 3GPP TS 32.130, v12.0.0, Dec. 2014. [2] Service aspects; Service principles. 3GPP TS 22.101, v14.0.0, Jun. 2015. [3] Evolved Universal Terrestrial Radio Access (E-UTRA); Physical layer procedures. 3GPP TS 36.213, v12.5.0, Rel. 12, Mar. 2015. [4] F. Baccelli and P. Br´emaud. Palm probabilities and stationary queues, volume 41. Springer Science & Business Media, 2012. [5] A. Banchs. User fair queuing: fair allocation of bandwidth for users. In IEEE INFOCOM, volume 3, pages 1668–1677. IEEE, 2002. [6] C. J. Bernardos et al. An architecture for software defined wireless networking. IEEE Wireless Communications, 21(3):52–61, 2014. [7] T. Bonald and L. Massouli´e. Impact of fairness on Internet performance. In ACM SIGMETRICS, volume 29, pages 82–91, 2001. [8] T. Bonald and A. Proutiere. Insensitive bandwidth sharing in data networks. Queueing systems, 44(1):69–100, 2003. [9] S. Brˆanzei, Y. Chen, X. Deng, A. Filos-Ratsikas, S. K. S. Frederiksen, and J. Zhang. The fisher market game: Equilibrium and welfare. 2014. [10] X. Costa-Perez et al. Radio access network virtualization for future mobile carrier networks. IEEE Comm. Magazine, 51(7):27–35, 2013. [11] G. de Veciana et al. Stability and performance analysis of networks supporting elastic services. IEEE/ACM TON, 9(1):2–14, 2001. [12] C. Dutang. Existence theorems for generalized Nash equilibrium problems. J. Nonlinear Analysis & Opt., 4(2):115–126, 2013. [13] F. Facchinei and C. Kanzow. Penalty methods for the solution of generalized Nash equilibrium problems. SIAM Journal on Optimization, 20(5):2228–2253, 2010. [14] M. Feldman et al. The proportional-share allocation market for computational resources. IEEE TPDS, 20(8):1075–1088, 2009. [15] E. Hyytia, P. Lassila, and J. Virtamo. Spatial node distribution of the random waypoint mobility model with applications. IEEE TMC, 5(6):680–694, June 2006. [16] ITU-R. Report ITU-R M.2135-1, Guidelines for evaluation of radio interface technologies for IMT-Advanced. Technical Report, 2009. [17] F. P. Kelly. Reversibility and Stochastic Networks. Cambridge University Press, 2011. [18] R. Kokku et al. NVS: A Substrate for Virtualizing Wireless Resources in Cellular Networks. IEEE/ACM TON, 20(5):1333–1346, 2012. [19] K. Lee et al. SLAW: Self-similar least-action human walk. IEEE/ACM TON, 20(2):515–529, 2012. [20] N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani. Algorithmic game theory, volume 1. Cambridge University Press Cambridge, 2007. [21] M. Richart, J. Baliosian, J. Serrat, and J. L. Gorricho. Resource slicing in virtual wireless networks: A survey. IEEE Transactions on Network and Service Management, 13(3):462–476, Sept 2016. [22] V. Shah and G. de Veciana. Performance evaluation and asymptotics for content delivery networks. In IEEE INFOCOM, 2014. [23] R. Srikant and L. Ying. Communication networks: an optimization, control, and stochastic networks perspective. Cambridge University Press, 2013. [24] A. Von Heusinger and C. Kanzow. Relaxation methods for generalized Nash equilibrium problems with inexact line search. Journal of Optimization Theory and Applications, 143(1):159–183, 2009. [25] S. J. Yang and G. de Veciana. Enhancing both network and user performance for networks supporting best effort traffic. IEEE/ACM TON, 12(2):349–360, 2004. [26] Q. Ye et al. User Association for Load Balancing in Heterogeneous Cellular Networks. IEEE Trans. Wireless Comm., pages 2706–2716, 2013. [27] L. Zhang. Proportional response dynamics in the Fisher market. Theoretical Computer Science, 412(24):2691–2698, May 2011. [28] X. Zhou, R. Li, T. Chen, and H. Zhang. Network slicing as a service: enabling enterprises’ own software-defined cellular networks. IEEE Communications Magazine, 54(7):146–153, Jul. 2016.
12